indetectables-net / teorias-numeradas
Mirror de las teorias numeradas del sitio de Narvaja
☆14Updated 5 months ago
Alternatives and similar repositories for teorias-numeradas:
Users that are interested in teorias-numeradas are comparing it to the libraries listed below
- Conjunto de manuales para reversa/analisis/cracking☆53Updated 2 years ago
- LD_PRELOAD rootkit☆128Updated 11 months ago
- Spoofing desktop login applications with WinForms and WPF☆170Updated 11 months ago
- ☆33Updated 2 years ago
- Open Keylogger Hardware Implant - USB & PS2 Keyboards☆64Updated this week
- ☆84Updated 2 years ago
- PowerShell script to generate ShellCode in various formats☆41Updated 4 months ago
- A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell option…☆14Updated last year
- CaveCarver - PE backdooring tool which utilizes and automates code cave technique☆217Updated last year
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆62Updated last month
- This is a simple example of DLL hijacking enabling proxy execution.☆65Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- ☆12Updated last year
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆39Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆25Updated 7 months ago
- A C2 framework built for my bachelors thesis☆55Updated 3 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆73Updated 3 months ago
- lib-nosa is a minimalist C library designed to facilitate socket connections through AFD driver IOCTL operations on Windows.☆71Updated 4 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆38Updated 5 years ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆98Updated 3 weeks ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆102Updated last year
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆106Updated last year
- Offensive Lua.☆179Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆59Updated last year
- Run Your Payload Without Running Your Payload☆179Updated 2 years ago
- A swiss army knife for pentesting networks☆24Updated 2 years ago
- Retrieve inner payloads from Donut samples☆88Updated 11 months ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 2 years ago
- Undetectable payload for Windows 10 and 11☆40Updated last year
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆83Updated 9 months ago